Polaris – Validation Of Best Practices In Your Kubernetes Clusters
Polaris is an open source policy engine for Kubernetes Polaris is an open source policy engine for Kubernetes that validates...
Polaris is an open source policy engine for Kubernetes Polaris is an open source policy engine for Kubernetes that validates...
A pure python library for identifying the use of known or very weak cryptographic secrets across a variety of platforms....
A cross-platform, collaborative, Command & Control framework written in C#, designed for red teaming and ease of use. HardHat is...
ReconAIzer is a powerful Jython extension for Burp Suite that leverages OpenAI to help bug bounty hunters optimize their recon...
Gato, or GitHub Attack Toolkit, is an enumeration and attack tool that allows both blue teamers and offensive security practitioners...
msLDAPDump simplifies LDAP enumeration in a domain environment by wrapping the lpap3 library from Python in an easy-to-use interface. Like...
certsync is a new technique in order to dump NTDS remotely, but this time without DRSUAPI: it uses golden certificate...
EndExt is a .go tool for extracting all the possible endpoints from the JS files Idea When you crawll all...
Handle hijacking is a technique used in Windows operating systems to gain access to resources and resources of a system...
This tools is very helpful for finding vulnerabilities present in the Web Applications. A web application scanner explores a web...
These are a collection of security and monitoring scripts you can use to monitor your Linux installation for security-related events...
Anti Forensics Tool For Red Teamers, Used For Erasing Some Footprints In The Post Exploitation Phase. Reduces Payload Burnout And...
Firefly is an advanced black-box fuzzer and not just a standard asset discovery tool. Firefly provides the advantage of testing...
The BackupOperatorToolkit contains different techniques allowing you to escalate from Backup Operator to Domain Admin. Usage The BackupOperatorToolkit (BOT) has...
It's a AV/EDR Evasion tool created to bypass security tools for learning, until now the tool is FUD. Features: Module...
A fiber is a unit of execution that must be manually scheduled by the application rather than rely on the...
C2-Hunter C2-Hunter is a program designed for malware analysts to extract Command and Control (C2) traffic from malwares in real-time....
burpgpt leverages the power of AI to detect security vulnerabilities that traditional scanners might miss. It sends web traffic to...
Sandboxes are commonly used to analyze malware. They provide a temporary, isolated, and secure environment in which to observe whether...
"Python memory module" AI generated pic - hotpot.ai pure-python implementation of MemoryModule technique to load a dll or unmanaged exe...
XSS Exploitation Tool is a penetration testing tool that focuses on the exploit of Cross-Site Scripting vulnerabilities. This tool is...
A DLL Loader With Advanced Evasive Features Features: CRT library independent. The final DLL file, can run the payload by...
Python 3 script to dump company employees from LinkedIn API Description LinkedInDumper is a Python 3 script that dumps employee...
Kubestroyer Kubestroyer aims to exploit Kubernetes clusters misconfigurations and be the swiss army knife of your Kubernetes pentests About The...